5
CVSSv2

CVE-2020-1648

Published: 17/07/2020 Updated: 01/01/2022
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

On Juniper Networks Junos OS and Junos OS Evolved devices, processing a specific BGP packet can lead to a routing process daemon (RPD) crash and restart. This issue can occur even before the BGP session with the peer is established. Repeated receipt of this specific BGP packet can result in an extended Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS: 18.2X75 versions starting from 18.2X75-D50.8, 18.2X75-D60 and later versions, before 18.2X75-D52.8, 18.2X75-D53, 18.2X75-D60.2, 18.2X75-D65.1, 18.2X75-D70; 19.4 versions 19.4R1 and 19.4R1-S1; 20.1 versions before 20.1R1-S2, 20.1R2. Juniper Networks Junos OS Evolved: 19.4-EVO versions before 19.4R2-S2-EVO; 20.1-EVO versions before 20.1R2-EVO. This issue does not affect: Juniper Networks Junos OS releases before 19.4R1. Juniper Networks Junos OS Evolved releases before 19.4R1-EVO.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

juniper junos 18.2x75

juniper junos 19.4

juniper junos 20.1

juniper junos os evolved 19.4

juniper junos os evolved 20.1